咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 87 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 202 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 186 篇 工学
    • 151 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 51 篇 电气工程
    • 25 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 13 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 10 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 202 篇 control flow gra...
  • 11 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 abstract syntax ...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 xu baowen

语言

  • 192 篇 英文
  • 6 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
202 条 记 录,以下是31-40 订阅
排序:
CG-Kit: Code Generation Toolkit for performant and maintainable variants of source code applied to Flash-X hydrodynamics simulations
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2025年 163卷
作者: Rudi, Johann Lee, Youngjun Chadha, Aidan H. Wahib, Mohamed Weide, Klaus O'Neal, Jared P. Dubey, Anshu Virginia Tech Dept Math 225 Stanger St Blacksburg VA 24061 USA Argonne Natl Lab Math & Comp Sci Div 9700 S Cass Ave Lemont IL 60439 USA RIKEN Ctr Computat Sci 7-1-26 Minatojima Minami Machi Kobe 6500047 Japan Univ Chicago Dept Comp Sci 5730 South Ellis Ave Chicago IL 60637 USA
CG-Kit is a new Code Generation tool-Kit that we have developed as a part of the solution for portability and maintainability for multiphysics computing applications. The development of CG-Kit is rooted in the urgent ... 详细信息
来源: 评论
Improving Similarity Measure for Java Programs Based on Optimal Matching of control flow graphs
收藏 引用
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING 2015年 第7期25卷 1171-1197页
作者: Qiu, Dehong Sun, Jialin Li, Hao Huazhong Univ Sci & Technol Sch Software Engn Wuhan 430074 Hubei Province Peoples R China
Measuring program similarity plays an important role in solving many problems in software engineering. However, because programs are instruction sequences with complex structures and semantic functions and furthermore... 详细信息
来源: 评论
A Combination Method for Android Malware Detection Based on control flow graphs and Machine Learning Algorithms
收藏 引用
IEEE ACCESS 2019年 7卷 21235-21245页
作者: Ma, Zhuo Ge, Haoran Liu, Yang Zhao, Meng Ma, Jianfeng Xidian Univ Sch Cyber Engn Xian 710071 Shaanxi Peoples R China Shaanxi Key Lab Network & Syst Secur Xian 710071 Shaanxi Peoples R China
Android malware severely threaten system and user security in terms of privilege escalation, remote control, tariff theft, and privacy leakage. Therefore, it is of great importance and necessity to detect Android malw... 详细信息
来源: 评论
Information entropy applied to software based control flow graphs
收藏 引用
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT 2018年 第5期9卷 1080-1091页
作者: Akundi, Aditya Smith, Eric Tseng, Tzu-Liang Univ Texas El Paso Ind Mfg & Syst Engn Dept El Paso TX 79968 USA
Information theory, introduced by Shannon in the context of information transfer in communication channels, is used as a foundation for research in many diverse fields. The concept Entropy in terms of information theo... 详细信息
来源: 评论
Practical dynamic reconstruction of control flow graphs
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2021年 第2期51卷 353-384页
作者: Rimsa, Andrei Amaral, Jose Nelson Pereira, Fernando M. Q. CEFET MG Dept Comp Av Amazonas 7675 BR-30510000 Belo Horizonte MG Brazil Univ Alberta Dept Comp Sci Edmonton AB Canada Univ Fed Minas Gerais Dept Comp Sci Belo Horizonte MG Brazil
The automatic recovery of a program's high-level representation from its binary version is a well-studied problem in programming languages. However, most of the solutions to this problem are based on purely static... 详细信息
来源: 评论
Generating Customised control flow graphs for Legacy Languages with Semi-Parsing  39
Generating Customised Control Flow Graphs for Legacy Languag...
收藏 引用
39th IEEE International Conference on Software Maintenance and Evolution (ICSME)
作者: Deknop, Celine Fabry, Johan Mens, Kim Zaytsev, Vadim UCLouvain ICTEAM Inst Ottignies Belgium Raincode Labs Brussels Belgium UTwente Formal Methods & Amp Tools Enschede Netherlands
We propose a tool and underlying technique that uses semi-parsing to extract control flow graphs from legacy source code (i.e., COBOL). Obtaining such control flow graphs is relevant in the industrial setting of legac... 详细信息
来源: 评论
Malware Classification by Learning Semantic and Structural Features of control flow graphs  20
Malware Classification by Learning Semantic and Structural F...
收藏 引用
20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Wu, Bolun Xu, Yuanhang Zou, Futai Shanghai Jiao Tong Univ Sch Cyber Sci & Engn Shanghai Peoples R China
Malware has become one of the biggest threats in the cyber world due to its ever-evolving nature. Machine learning-based methods rely on expertise in selecting handcrafted features which is time-consuming. Recent cont... 详细信息
来源: 评论
Cosine Similarity through control flow graphs For Secure Software Engineering  7
Cosine Similarity through Control Flow Graphs For Secure Sof...
收藏 引用
7th International Conference on Engineering and Emerging Technologies (ICEET)
作者: Desku, Astrit Raufi, Bujar Luma, Artan Selimi, Besnik South East European Univ Fac Contemporary Sci & Technol Tetovo North Macedonia
As the recommender systems need data to generate a recommendation, the dataset is intended as a standardized input for research on recommendation systems for software engineering but is also useful in many other areas... 详细信息
来源: 评论
Creating and manipulating control flow graphs with multilevel grouping and code coverage
Creating and manipulating control flow graphs with multileve...
收藏 引用
8th International Conference on Enterprise Information Systems (ICEIS 2006)
作者: Sofokleous, Anastasis A. Andreou, Andreas S. Iaokim, Gianna Brunel Univ Uxbridge UB8 3PH Middx England Univ Cyprus Nicosia Cyprus
Various researchers and practitioners have proposed the use of control flow graphs for investigating software engineering aspects, such as testing, slicing, program analysis and debugging. However, the relevant softwa... 详细信息
来源: 评论
Test Case Selection Technique for Regression Testing Using Differential control flow graphs  16
Test Case Selection Technique for Regression Testing Using D...
收藏 引用
16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
作者: Akimoto, Shun Yaegashi, Rihito Takagi, Tomohiko Kagawa Univ Grad Sch Engn Takamatsu Kagawa Japan Kagawa Univ Fac Engn Takamatsu Kagawa Japan
This paper shows a new technique to select effective test cases for regression testing of software. In the technique, an UCN (update complexity number) of each module of software under test is calculated based on a di... 详细信息
来源: 评论